Sciweavers

1352 search results - page 253 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ACSC
2007
IEEE
14 years 1 months ago
Exploring Human Judgement of Digital Imagery
Statistical learning methods are commonly applied in content-based video and image retrieval. Such methods require a large number of examples which are usually obtained through a ...
Timo Volkmer, James A. Thom, Seyed M. M. Tahaghogh...
QSIC
2007
IEEE
14 years 1 months ago
Synthesizing Component-Based WSN Applications via Automatic Combination of Code Optimization Techniques
Wireless sensor network (WSN) applications sense events in-situ and compute results in-network. Their software components should run on platforms with stringent constraints on nod...
Zhenyu Zhang, W. K. Chan, T. H. Tse
GECCO
2007
Springer
230views Optimization» more  GECCO 2007»
14 years 1 months ago
Activation energy-based simulation for self-assembly of multi-shape tiles
Building artificial systems using self-assembly is one of the main issues of artificial life [17]. Scientists are trying to understand this process either using experimental appro...
Mostafa Mostafa Hashim Ellabaan
INFOCOM
2006
IEEE
14 years 1 months ago
Time Synchronization for High Latency Acoustic Networks
— Distributed time synchronization is an important part of a sensor network where sensing and actuation must be coordinated across multiple nodes. Several time synchronization pr...
Affan A. Syed, John S. Heidemann
ICRA
2005
IEEE
103views Robotics» more  ICRA 2005»
14 years 1 months ago
Dimensioning a Constrained Parallel Robot to Reach a Set of Task Positions
— The paper considers the problem of setting the dimensions of a system of constrained parallel robots to ensure that together they can position an end-effector in a specified s...
Hai-Jun Su, J. Michael McCarthy